We rely heavily on our Sponsor's financial, accounting, treasury, communications and other data processing systems. These systems may fail to operate properly or become disabled as a result of tampering or a breach of the network security systems or otherwise. In addition, these systems are from time to time subject to cyberattacks, which may continue to increase in sophistication and frequency in the future. Attacks on us and our Sponsor's and service providers' systems could involve attempts that are intended to obtain unauthorized access to our proprietary information or personal information of our stockholders or borrowers (and their beneficial owners), destroy data or disable, degrade or sabotage our systems, including through the introduction of computer viruses and other malicious code. Such incidents could arise from a range of vectors, such as social engineering/phishing, company insiders, suppliers or providers, and as a result of human or technological error, including misconfigurations, bugs, or other vulnerabilities in software and hardware.
Cybersecurity incidents and cyberattacks have been occurring globally at a more frequent and severe level and will likely continue to increase in frequency in the future. Our information and technology systems as well as those of our Sponsor and other related parties, such as service providers, may be vulnerable to damage or interruption from cybersecurity breaches, computer viruses or other malicious code, network failures, computer and telecommunication failures, infiltration by unauthorized persons and other security breaches, usage errors by their respective professionals or service providers, power, communications or other service outages and catastrophic events such as fires, tornadoes, floods, hurricanes and earthquakes. As a result of the increased demand for remote working arrangements and our general reliance on internet technology, which may create additional opportunities for cyber criminals to exploit vulnerabilities, we may face increased cybersecurity risks. Cyberattacks and other security threats could originate from a wide variety of sources, including cyber criminals, state-sponsored hackers, hacktivists and other outside parties. There has been an increase in the frequency and sophistication of the cyber and security threats we face, with attacks ranging from those common to businesses generally to those that are more advanced and persistent, which may target us or our Sponsor because we hold a significant amount of confidential and sensitive information. As a result, we and our Sponsor may face a heightened risk of a security breach or disruption with respect to this information. If successful, these types of attacks on our or our Sponsor's network or other systems could have a material adverse effect on us, due to, among other things, the loss of investor or proprietary data, interruptions or delays in the operation of our business and damage to our reputation. The costs to mitigate network security problems, bugs, viruses, worms, malicious software programs, and security vulnerabilities could be significant and are likely to increase in the future. These costs include, but are not limited to, retaining the services of cybersecurity providers; compliance costs arising out of existing and future cybersecurity, data protection and privacy laws and regulations; and costs related to maintaining redundant networks, data backups and other damage-mitigation measures. While our Sponsor is generally responsible for such costs in the first instance, we have indemnified the Sponsor for certain losses that it may incur in connection with the operation of the Company's business. Regardless, there can be no assurance that measures we or our Sponsor takes to ensure the integrity of our systems will provide protection, especially because cyberattack techniques used change frequently, or may not be recognized until successful, and are becoming more sophisticated – including by use of artificial intelligence – that circumvent security controls, evade detection and remove forensic evidence. As a result, we or our Sponsor may be unable to detect, investigate, remediate or recover from future attacks or incidents, or to avoid a material adverse impact to our information systems, confidential information or business.
If unauthorized parties gain access to this information and technology systems, they may be able to steal, publish, delete or modify private and sensitive information, including non-public personal information related to stockholders or borrowers (and their beneficial owners) and material non-public information. Although we and our Sponsor have implemented, and our service providers may implement, various measures to manage risks relating to these types of events, these systems could prove to be inadequate and, if compromised, could become inoperable for extended periods of time, cease to function properly or fail to adequately secure private information. We do not control the cybersecurity plans and systems put in place by third-party service providers, and these third-party service providers may have limited indemnification obligations to us or our Sponsor, each of which could be negatively impacted as a result. Breaches such as those involving covertly introduced malware, impersonation of authorized users and industrial or other espionage may not be identified even with sophisticated prevention and detection systems, potentially resulting in further harm and preventing them from being addressed appropriately. The failure of these systems or of disaster recovery plans for any reason could cause significant interruptions in our operations and result in a failure to maintain the security, confidentiality or privacy of sensitive data, including personal information relating to stockholders, material non-public information and the intellectual property and trade secrets and other sensitive information in the possession of us or our Manager. We could be required to make a significant investment to remedy the effects of any failures, harm to our reputations, legal claims that we and our Manager may be subjected to, regulatory action or enforcement arising out of applicable privacy and other laws, adverse publicity and other events that may materially and adversely affect us.
In addition, our business highly depends on information systems and technology. The costs related to cyber or other security threats or disruptions may not be fully insured or indemnified by other means. Although we maintain insurance policies, we cannot be certain that any or all of the costs and liabilities incurred in relation any cybersecurity attack or incident will be covered or that applicable insurance will be available to us in the future on economically reasonable terms or at all. Many jurisdictions in which we operate have laws and regulations relating to data privacy, cybersecurity and protection of personal information. Some jurisdictions have also enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal data. Breaches in security could potentially jeopardize our or our Manager's, its employees', or our investors' or counterparties' confidential and other information processed and stored in, and transmitted through, our computer systems and networks, or otherwise cause interruptions or malfunctions in our or our investors', our counterparties' or third parties' operations, which could result in significant losses, increased costs, disruption of our business, liability to our investors and other counterparties, regulatory intervention or reputational damage. Furthermore, if we or our Manager fail to comply with the relevant laws and regulations, it could result in regulatory investigations and penalties, which could lead to negative publicity and may cause our investors to lose confidence in the effectiveness of our or our Manager's security measures. Indeed, any adverse impact to the availability, integrity or confidentiality of our information systems or confidential information can result in legal claims or proceedings (such as class actions), regulatory investigations and enforcement actions, fines and penalties, negative reputational impacts that cause us to lose existing or future customers, and/or significant incident response, system restoration or remediation and future compliance costs. Any or all of the foregoing could materially adversely affect our business, operating results, and financial condition.
A disaster or a disruption in the infrastructure that supports our business, including a disruption involving electronic communications or other services used by us or third parties with whom we conduct business, could have a material adverse impact on our ability to continue to operate our business without interruption. Our and our Sponsor's disaster recovery programs may not be sufficient to mitigate the harm that may result from such a disaster or disruption. In addition, insurance and other safeguards might only partially reimburse us for our losses, if at all.